ImageVerifierCode 换一换
格式:PDF , 页数:112 ,大小:2MB ,
资源ID:396228      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-396228.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(BS ISO IEC 11577-1995 Information technology - Open systems interconnection - Network layer security protocol《信息技术 开放式系统互连 网络层安全协议》.pdf)为本站会员(tireattitude366)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

BS ISO IEC 11577-1995 Information technology - Open systems interconnection - Network layer security protocol《信息技术 开放式系统互连 网络层安全协议》.pdf

1、BRITISH STANDARD BS ISO/IEC 11577:1995 Implementation of ISO/IEC 11577:1995 Information technology Open Systems Interconnection Network layer security protocolBSISO/IEC11577:1995 This British Standard, having been prepared under the directionof the Information Systems Technology Assembly,was publish

2、ed underthe authority of the Standards Board and comes intoeffect on 15October1995 BSI 02-2000 The following BSI references relate to the work on this standard: Committee reference IST/6 Draft for comment 93/640428 DC ISBN 0 580 24807 0 Committees responsible for this BritishStandard The preparation

3、 of this British Standard was entrusted to Technical Committee IST/6, Data communications, upon which the following bodies were represented: British Computer Society British Telecommunications plc CCTA (the Government Centre for Information Systems) Digital Equipment Co. Ltd. IBM United Kingdom Ltd.

4、 Institution of Electrical Engineers International Computers Limited Logica UK Ltd. Nine Tiles Computer Systems Ltd. Rank Xerox (UK) Ltd. Amendments issued since publication Amd. No. Date CommentsBSISO/IEC11577:1995 BSI 02-2000 i Contents Page Committees responsible Inside front cover National forew

5、ord ii Foreword vi Text of ISO/IEC 11577 1BSISO/IEC11577:1995 ii BSI 02-2000 National foreword This British Standard reproduces verbatim ISO/IEC11577:1995 and implements it as the UK national standard. This British Standard is published under the direction of the Information Systems Technology Assem

6、bly whose Technical Committee IST/6 has the responsibility to: aid enquirers to understand the text; present to the responsible international committee any enquiries on interpretation, or proposals for change, and keep UK interests informed; monitor related international and European developments an

7、d promulgate them in the UK. NOTEInternational and European Standards, as well as overseas standards, are available from Customer Services, BSI, 389 Chiswick High Road, London W4 4AL. A British Standard does not purport to include all the necessary provisions of a contract. Users of British Standard

8、s are responsible for their correct application. Compliance with a British Standard does not of itself confer immunity from legal obligations. Summary of pages This document comprises a front cover, an inside front cover, pages i and ii, theISO/IEC title page, pages ii to vi, pages 1 to 100 and a ba

9、ck cover. This standard has been updated (see copyright date) and may have had amendments incorporated. This will be indicated in the amendment table on the inside front cover.ISO/IEC11577:1995(E) ii BSI 02-2000 Contents Page Foreword vi Introduction 1 1 Scope 1 2 Normative references 2 2.1 Identica

10、l Recommendations|International Standards 2 2.2 Paired Recommendations|International Standards equivalent in technical content 2 2.3 Additional References 3 3 Definitions 3 3.1 Reference Model definitions 3 3.2 Security Architecture definitions 3 3.3 Service Convention definitions 4 3.4 Network Serv

11、ice definitions 4 3.5 Internal Organisation of the Network Layer definitions 4 3.6 Connectionless Network Protocol definitions 4 3.7 Upper Layer Security Model definitions 4 3.8 Conformance Testing definitions 4 3.9 Additional definitions 4 4 Abbreviations 5 4.1 Data Units 5 4.2 Protocol Data Unit F

12、ields 5 4.3 Parameters 5 4.4 Miscellaneous 6 5 Overview of the Protocol 6 5.1 Introduction 6 5.2 Overview of Services Provided 7 5.3 Overview of Services Assumed 7 5.4 Security Associations and Security Rules 8 5.5 Overview of Protocol Protection Functions 9 5.6 Overview of Protocol NLSP-CL 10 5.7 O

13、verview of Protocol NLSP-CO 11 6 Protocol Functions Common to NLSP-CL and NLSP-CO 13 6.1 Introduction 13 6.2 Common SA Attributes 13 6.3 Common Functions on a Request for an Instance of Communication 14 6.4 Secure Data Transfer Protocol Functions 14 6.5 Use of a Security Association Protocol 16 7 Pr

14、otocol Functions FOR NLSP-CL 16 7.1 Services Provided by NLSP-CL 16 7.2 Services Assumed 17 7.3 Security Association Attributes 17 7.4 Checks 17 7.5 In-Band SA Establishment 17 7.6 Processing NLSP-UNITDATA Request 17 7.7 Processing UN-UNITDATA Indication 18 8 Protocol Functions for NLSP-CO 19 8.1 Se

15、rvices Provided by NLSP-CO 19 8.2 Services Assumed 19 8.3 Security Association Attributes 21ISO/IEC11577:1995(E) BSI 02-2000 iii Page 8.4 Checks and other Common Functions 21 8.5 NLSP-Connect Functions 22 8.6 NLSP-DATA Functions 32 8.7 NLSP-EXPEDITED-DATA Functions 33 8.8 RESET Functions 34 8.9 NLSP

16、-DATA ACKNOWLEDGE 35 8.10 NLSP-DISCONNECT 35 8.11 Other Functions 38 8.12 Peer Entity Authentication 39 9 Overview of Mechanisms used 40 9.1 Security Services and Mechanisms 40 9.2 Functions Supported 41 10 Connection security control (NLSP-CO only) 41 10.1 Overview 41 10.2 SA-Attributes 42 10.3 Pro

17、cedures 43 10.4 CSC-PDU Fields used 44 11 SDT PDU Based encapsulation Function 44 11.1 Overview 44 11.2 SA Attributes 44 11.3 Procedures 46 11.4 PDU Fields used 48 12 No-Header Encapsulation Function (NLSP-CO only) 48 12.1 Overview 48 12.2 SA Attributes 48 12.3 Procedures 49 13 Structure and Encodin

18、g of PDUS 49 13.1 Introduction 49 13.2 Content Field Format 50 13.3 Protected Data 50 13.4 Security Association PDU 55 13.5 Connection Security Control PDU 56 14 Conformance 58 14.1 Static Conformance Requirements 58 14.2 Dynamic Conformance Requirements 59 14.3 Protocol Implementation Conformance S

19、tatement 60 Annex A Mapping UN primitives to CCITT Rec. X.213|ISO 8348 61 Annex B Mapping UN Primitives to CCITT Rec. X.25|ISO 8208 61 Annex C Security Association Protocol Using Key Token Exchange andDigitalSignatures 62 C.1 Overview 62 C.2 Key Token Exchange (KTE) 63 C.3 SA-Protocol Authentication

20、 63 C.4 SA Attribute Negotiation 63 C.5 SA Abort/Release 65 C.6 Mapping of SA-Protocol Functions to Protocol Exchanges 65 C.7 SA PDU SA Contents 67 Annex D NLSP PICS Proforma 71 D.1 Introduction 71ISO/IEC11577:1995(E) iv BSI 02-2000 Page D.2 Abbreviations and Special Symbols 71 D.3 Instructions for

21、Completing the PICS Proforma 71 D.4 Identification 73 D.5 Features Common to NLSP-CO and NLSP-CL 74 D.6 Features Specific to NLSP-CL 78 D.7 Features Specific to NLSP-CO 79 Annex E Tutorial on some Basic Concepts of NLSP 82 E.1 Basis of Protection 82 E.2 Underlying vs NLSP Service 82 E.3 NLSP Address

22、ing 83 E.4 Connection Mode NLSP 87 E.5 Connectionless Mode NLSP 88 E.6 Security Attributes and Associations 93 E.7 Dynamic Functional Relationship between NLSP and CLNP 93 E.8 Dynamic Functionality Related to Layered Model 95 Annex F Example of an Agreed Set of Security Rules 97 Annex G Security Ass

23、ociations and Attributes 98 Annex H Example Key Token Exchange EKE Algorithm 99 Figure 8-1 Service Primitive Time Sequence Diagram for NLSP-CONNECT in UN-CONNECT 24 Figure 8-2 Service Primitive Time Sequence Diagram for NLSP-CONNECT in UN-CONNECT with SA-P 27 Figure 8-3 Service Primitive Time Sequen

24、ce Diagram for NLSP-CONNECT in UN-DATA 29 Figure 8-4 Service Primitive Time Sequence Diagram for NLSP-DISCONNECT 36 Figure 8-5 NLSP initiated disconnect due to an unsuccessful SA-P 38 Figure 13-1 Content Field 50 Figure 13-2 Generic Secure Data Transfer PDU Structure 51 Figure 13-3 Confidentiality o

25、nly using No_Header Option 51 Figure 13-4 Unprotected Header 51 Figure 13-5 Structure of Encapsulated Octet String 52 Figure 13-6 Octet-String-Before-Encapsulation 52 Figure 13-7 Test Data 54 Figure 13-8 Value of Label 54 Figure 13-9 Security Association PDU Structure 55 Figure 13-10 Connection Secu

26、rity Control PDU 56 Figure 13-11 CSC-PDU Contents 57 Figure 13-12 Enciphered Auth-data 57 Figure C.1 SA Contents 67 Figure E.1 Building a Secure Data Transfer PDU 82 Figure E.2 Illustration of NLSP-CO with an Intermediate System 83 Figure E.3-1 Upper and lower SAPs and addresses 83 Figure E.3-2 NLSP

27、 Placement in the Network layer 84 Figure E.3-3 Addresses in a Network layer containing a NLSP sub-layer-With one Network Protocol (NP) above and below NLSP 84 Figure E.3-4 Addresses in a Network layer containing a NLSP sub-layer-With Network Protocol (NP) above and below NLSP No Network Protocol 84

28、ISO/IEC11577:1995(E) BSI 02-2000 v Page Figure E.3-5 Virtual UN within an OSIE 85 Figure E.3-6 Placements of the NLSPE in the Network layer 86 Figure E.4-1 Illustration of NLSP within an Multi-network Environment 88 Figure E.4-2 Illustration of NLSP-CO between End Systems 89 Figure E.4-3 NLSP-CO wit

29、h an Untrusted Network 89 Figure E.4-4 Illustration of NLSP-CO with Untrusted Relay System 90 Figure E.5-1 Illustration of NLSP-CL between End Systems 91 Figure E.5-2 Illustration of NLSP-CL with Untrusted Subnetwork 91 Figure E.5-3 Illustration of NLSP-CL with Untrusted Relay System 92 Figure E.7-1

30、 Flow Chart of NLSP with CLNP 94 Figure E.7-2 Layered Model Related to Flow Chart 95 Figure G.1 Illustration of 3 tiers of Security Association 99 Figure H.1 Illustration of On-line Key Derivation and DerivationusingEKE 100 Table 8-1 Table Giving Limitations for NLSP Connection EstablishmentMode 23

31、Table 8-2 CSC PDU Flags Identifying NLSP Connection Set Up Procedures 24 Table 14-1 NLSP Support for PDUs 59 Table A-1 61 Table B.1 61 Table E.1 87ISO/IEC11577:1995(E) vi BSI 02-2000 Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commiss

32、ion) form the specialized system for worldwide standardization. National bodies that are members of ISO or IECparticipate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO an

33、d IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IE

34、CJTC1. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least75% of the national bodies casting a vote. International Standard ISO/IEC11577 was prepared by Joint Techn

35、ical Committee ISO/IEC JTC1, Information technology, Subcommittee SC6, Telecommunications and information exchange between systems, in collaboration with ITU-T. The identical text is published as ITU-T Recommendation X.273. NOTEThe publication dates of ISO/IEC7498-1, ISO/IEC9646-1, ISO/IEC9646-2, IS

36、O/IEC10731, ISO/IEC10745 and ISO/IECTR13594, referenced in this International Standard, differ from those referenced in the identical ITU Recommendation X.273 due to the publication of new editions during final preparation of this International Standard. Annex A to Annex D form an integral part of t

37、his International Standard. Annex E to Annex H are for information only.ISO/IEC11577:1995(E) BSI 02-2000 1 Introduction The protocol defined by this ITU-T Recommendation|International Standard is used to provide security services in support of an instance of communication between lower layer entitie

38、s. This protocol is positioned with respect to other Standards by the layered structure defined in CCITT Rec. X.200|ISO/IEC7498-1 and by the Network layer organization as defined in ISO8648 and extended by ITU-T Rec. X.802|ISO/IECTR13594 (Lower Layer Security Model). It provides security services in

39、 support of both connection-mode and connectionless-mode Network services. In particular, this protocol is located in the Network layer, and it has functional interfaces and clearly defined service interfaces at its upper and lower boundaries. To evaluate conformance of a particular implementation,

40、it is necessary to have a statement of which capabilities and options have been implemented for a given OSI protocol. Such a statement is called a Protocol Implementation Conformance Statement (PICS). 1 Scope This ITU-T Recommendation|International Standard specifies a protocol to be used by End Sys

41、tems andIntermediate Systems in order to provide security services in the Network layer, which is definedbyCCITT Rec. X.213|ISO/IEC8348, and ISO8648. The protocol defined in this ITU-T Recommendation|International Standard is called the Network Layer Security Protocol (NLSP). This ITU-T Recommendati

42、on|International Standard specifies: 1) Support for the following security services defined in CCITT Rec. X.800|ISO7498-2: a) peer entity authentication; b) data origin authentication; c) access control; d) connection confidentiality; e) connectionless confidentiality; f) traffic flow confidentialit

43、y; g) connection integrity without recovery (including Data Unit Integrity, in which individual SDUs on a connection are integrity protected); h) connectionless integrity. 2) The functional requirements for implementations that claim conformance to this ITU-T Recommendation|International Standard. T

44、he procedures of this protocol are defined in terms of: a) requirements on the cryptographic techniques that can be used in an instance of this protocol; b) requirements on the information carried in the security association used in an instance of communication. Although the degree of protection aff

45、orded by some security mechanisms depends on the use of some specific cryptographic techniques, correct operation of this protocol is not dependent on the choice of any particular encipherment or decipherment algorithm. This is a local matter for the communicating systems. Furthermore, neither the c

46、hoice nor the implementation of a specific security policy are within the scope of this ITU-T Recommendation|International Standard. The choice of a specific security policy, and hence the degree of protection that will be achieved, is left as a local matter among the systems that are using a single

47、 instance of secure communications. This ITU-T Recommendation|International Standard does not require that multiple instances of secure communications involving a single open system must use the same security protocol. Annex D provides the PICS proforma for the Network Layer Security Protocol in com

48、pliance with the relevant guidance given in ISO/IEC9646-2.ISO/IEC11577:1995(E) 2 BSI 02-2000 2 Normative references The following Recommendations and International Standards contain provisions which, though reference in this text, constitute provisions of this ITU-T Recommendation|International Stan

49、dard. At time of publication, the editions indicated were valid. All Recommendations and Standards are subject to revision, and parties to agreements based on this ITU-T Recommendation|International Standard are encouraged to investigate the possibility of applying the most recent edition of the Recommendations and Standards listed below. Members of IEC and ISO maintain a registry of currently valid International Standards. The Telecommunications Standardization Bureau of IT

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1